Author Topic: Malware static analysis  (Read 2208 times)

0 Members and 1 Guest are viewing this topic.

Offline Axon

  • VIP
  • King
  • *
  • Posts: 2047
  • Cookies: 319
    • View Profile
Malware static analysis
« on: October 21, 2012, 08:01:33 pm »
A paper dealing with static analysis of malware, in this paper you will learn to Determine extent of infection, network risk, determine risk of data exposure, figure out infection vector and propagation methods, etc.


Offline s3my0n

  • Knight
  • **
  • Posts: 276
  • Cookies: 58
    • View Profile
    • ::1
Re: Malware static analysis
« Reply #1 on: October 22, 2012, 01:31:28 am »
Part 1 of 2? So this is incomplete upload?
Easter egg in all *nix systems: E(){ E|E& };E

Offline Axon

  • VIP
  • King
  • *
  • Posts: 2047
  • Cookies: 319
    • View Profile
Re: Malware static analysis
« Reply #2 on: October 22, 2012, 02:08:19 am »
Part 1 of 2? So this is incomplete upload?


This paper has been released in 2012, the second part has not been released yet. This is a complete paper covering the subject of static analysis, for dynamic analysis, you can wait for the second part or search the web. There are plenty of papers.

Offline s3my0n

  • Knight
  • **
  • Posts: 276
  • Cookies: 58
    • View Profile
    • ::1
Re: Malware static analysis
« Reply #3 on: October 22, 2012, 03:36:08 am »
Oh ok, sorry then Axon, I thought it was an upload split in halves. Thanks.
Easter egg in all *nix systems: E(){ E|E& };E

Offline geXXos

  • Royal Highness
  • ****
  • Posts: 646
  • Cookies: 178
    • View Profile
Re: Malware static analysis
« Reply #4 on: October 26, 2012, 02:33:31 pm »
Very nice work Axon and thanks for sharing this valuable information. +1


One dump question though, why stay anonymous during investigation of a malicious domain?



 

Offline EmilKXZ

  • Peasant
  • *
  • Posts: 109
  • Cookies: 10
  • likes monies :p
    • View Profile
    • EmilKXZ
Re: Malware static analysis
« Reply #5 on: October 28, 2012, 02:05:51 am »
Staying anonymous is essential for all malware research. Why is that? for several reasons:
  • You do not want your information to show up in their logs. That ties you back to you and your organization.
  • If they can identify you, you can spoil your own research. When they profile you (and consider they might see you first than you to them), they'll most likely block anything related to you, making it harder to yourself the research.
  • Last but not least, they can retaliate at you. E.g.: Storm Worm started a DDoS attack to those systems that scanned them.
Can't think of more reasons right now, but that should be enough for now.  ::)

Offline geXXos

  • Royal Highness
  • ****
  • Posts: 646
  • Cookies: 178
    • View Profile
Re: Malware static analysis
« Reply #6 on: October 28, 2012, 11:01:58 am »
Yes that make sense, that's  enough for me  :)


Thank you for the reply.